
Computers 2e
Quiz
•
Computers
•
12th Grade
•
Easy
Akau Anyieth
Used 6+ times
FREE Resource
Enhance your content in a minute
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #201
Topic 1
A user reports a workstation has been performing strangely after a suspicious email was opened on it earlier in the week. Which of the following should the technician perform FIRST?
A. Escalate the ticket to Tier 2.
B. Run a virus scan.
C. Utilize a Windows restore point.
D. Reimage the computer.
Answer explanation
When a user reports unusual behavior on a workstation after opening a suspicious email, the first and most immediate step should be to run a virus scan to check for malware or malicious software. Running a virus scan will help identify and potentially remove any threats that might have been introduced through the suspicious email. Escalating the ticket, using a Windows restore point, or reimaging the computer can be considered as follow-up steps depending on the results of the virus scan and the severity of the issue, but running a virus scan is the initial action to take in this scenario to address potential security threats.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #202
Topic 1
Which of the following wireless security features can be enabled to allow a user to use login credentials to attach to available corporate SSIDs?
A. TACACS+
B. Kerberos
C. Preshared key
D. WPA2/AES
Answer explanation
Kerberos is a network authentication protocol that can be used to provide secure authentication for users connecting to corporate SSIDs (Service Set Identifiers) via wireless networks. It allows users to use login credentials to authenticate themselves securely on the network.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #203
Topic 1
Which of the following would MOST likely be used to change the security settings on a user's device in a domain environment?
A. Security groups
B. Access control list
C. Group Policy
D. Login script
Answer explanation
Group policy is used to change the security settings of users
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #204
Topic 1
Which of the following often uses an SMS or third-party application as a secondary method to access a system?
A. MFA
B. WPA2
C. AES
D. RADIUS
Answer explanation
Often websites, or web-application services will require a second step/method to login, most use SMS to quickly send a verification, if not, verification is often done through their self-provided, or trusted third party app authenticator.
Often websites, or web-application services will require a second step/method to login, most use SMS to quickly send a verification, if not, verification is often done through their self-provided, or trusted third party app authenticator.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #205
Topic 1
A technician needs to ensure that USB devices are not suspended by the operating system. Which of the following Control Panel utilities should the technician use to configure the setting?
A. System
B. Power Options
C. Devices and Printers
D. Device Manager
Answer explanation
Open the "Control Panel." Navigate to "Power Options." Click on the selected power plan (e.g., "Balanced" or "High Performance"). Click on "Change plan settings." Click on "Change advanced power settings." In the "Advanced settings" window, look for the "USB settings" category. Under "USB settings," you should find an option related to USB selective suspend. Set it to "Disabled." Click "Apply" and then "OK" to save the changes
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #206
Topic 1
A technician needs to manually set an IP address on a computer that is running macOS. Which of the following commands should the technician use?
A. ipconfig
B. ifconfig
C. arpa
D. ping
Answer explanation
If you enter the command “ifconfig” in the terminal, all information will be displayed. You can also use the commands “ip addr” or “ip a”. Confirm with [Enter]. You'll now be shown all IP addresses that are in your network
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Question #207
Topic 1
A user receives a call from someone who claims to be from the user's bank and requests information to ensure the user's account is safe. Which of the following social-engineering attacks is the user experiencing?
A. Phishing
B. Smishing
C. Whaling
D. Vishing
Answer explanation
Vishing, also known as Voice Phishing, is a social engineering attack where an attacker uses a phone call to impersonate a legitimate entity, such as a bank representative, government agency, or customer service representative. The attacker typically tries to manipulate the victim into revealing sensitive information, such as account numbers, passwords, or other personal information, by creating a sense of urgency or fear.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
50 questions
kuis Jaringan Internet
Quiz
•
9th Grade - University
50 questions
PHOTOSHOP INTRO
Quiz
•
9th - 12th Grade
54 questions
eSkill-8
Quiz
•
12th Grade
53 questions
Intro To Networking 123
Quiz
•
9th - 12th Grade
45 questions
Quiz TIK
Quiz
•
12th Grade
55 questions
basis data
Quiz
•
12th Grade
50 questions
Microsoft Word Tekrar
Quiz
•
9th - 12th Grade
50 questions
Digital Media II Final Study Guide
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
Discover more resources for Computers
15 questions
Internet Vocabulary Notebook Check #2 - CTEA(2024)
Quiz
•
12th Grade
11 questions
Internet Terms Vocabulary- Notebook Check #1- CTEA
Quiz
•
12th Grade
50 questions
Money Matters Fall 2025 Final Exam — Worksheet Questions
Quiz
•
12th Grade
47 questions
CSF Final Exam Practice
Quiz
•
9th - 12th Grade
